You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## A log search alert fired when it shouldn't have
51
-
52
-
A configured [log alert rule in Azure Monitor](./alerts-log.md) might be triggered unexpectedly. The following sections describe some common reasons.
53
-
54
-
1.**Was the alert triggered due to latency issues?**
55
-
56
-
Azure Monitor processes terabytes of customer logs globally, which can cause [logs ingestion latency](../logs/data-ingestion-time.md). There are built-in capabilities to prevent false alerts, but they can still occur on very latent data (over ~30 minutes) and data with latency spikes.
57
-
58
-
Logs are semi-structured data and are inherently more latent than metrics. If you're experiencing many misfires in fired alerts, consider using [metric alerts](alerts-types.md#metric-alerts). You can send data to the metric store from logs using [metric alerts for logs](alerts-metric-logs.md).
59
-
60
-
Log search alerts work best when you are try to detect specific data in the logs. They are less effective when you are trying to detect lack of data in the logs, like alerting on virtual machine heartbeat.
61
-
62
50
1.**Was the the log search alert rule disabled?**
63
51
64
52
If a log search alert rule query fails to evaluate continuously for a week, Azure Monitor disables it automatically.
@@ -149,6 +137,20 @@ When a log alert rule is created, the query is validated for correct syntax. But
149
137
150
138
[Azure Advisor](../../advisor/advisor-overview.md) warns you about this behavior. It adds a recommendation about the affected log search alert rule. The category used is 'High Availability' with medium impact and a description of 'Repair your log alert rule to ensure monitoring'.
151
139
140
+
141
+
## A log search alert fired when it shouldn't have
142
+
143
+
A configured [log alert rule in Azure Monitor](./alerts-log.md) might be triggered unexpectedly. The following sections describe some common reasons.
144
+
145
+
1.**Was the alert triggered due to latency issues?**
146
+
147
+
Azure Monitor processes terabytes of customer logs globally, which can cause [logs ingestion latency](../logs/data-ingestion-time.md). There are built-in capabilities to prevent false alerts, but they can still occur on very latent data (over ~30 minutes) and data with latency spikes.
148
+
149
+
Logs are semi-structured data and are inherently more latent than metrics. If you're experiencing many misfires in fired alerts, consider using [metric alerts](alerts-types.md#metric-alerts). You can send data to the metric store from logs using [metric alerts for logs](alerts-metric-logs.md).
150
+
151
+
Log search alerts work best when you are try to detect specific data in the logs. They are less effective when you are trying to detect lack of data in the logs, like alerting on virtual machine heartbeat.
152
+
153
+
152
154
## Error messages when configuring log search alert rules
153
155
154
156
### The query couldn't be validated since you need permission for the logs
0 commit comments